Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 10:14
Behavioral task
behavioral1
Sample
a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll
Resource
win7-20241023-en
windows7-x64
9 signatures
120 seconds
General
-
Target
a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll
-
Size
80KB
-
MD5
8b0386d1da743cd68938e9bc3ea41877
-
SHA1
370571c3b2e9e26a96f309056d3c14744f65615a
-
SHA256
a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d
-
SHA512
b9afa0bad92a2cc89aad615cec88b9a18dd60925a7755e6d94c0120d8f3a8b302db322ff03ba74442725bb760c3700d8d14f2b6499eb79ce1955af8870265969
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEeWpQi:5dbwovEVyqgoZmZXWfIdQdRaefPrEv
Malware Config
Signatures
-
pid Process 3268 arp.exe 4492 arp.exe 4348 arp.exe 3888 arp.exe 396 arp.exe 1372 arp.exe 3864 arp.exe 3712 arp.exe 4392 arp.exe -
resource yara_rule behavioral2/memory/4896-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral2/memory/4896-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 5100 4896 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4896 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 796 wrote to memory of 4896 796 rundll32.exe 83 PID 796 wrote to memory of 4896 796 rundll32.exe 83 PID 796 wrote to memory of 4896 796 rundll32.exe 83 PID 4896 wrote to memory of 1372 4896 rundll32.exe 84 PID 4896 wrote to memory of 1372 4896 rundll32.exe 84 PID 4896 wrote to memory of 1372 4896 rundll32.exe 84 PID 4896 wrote to memory of 3268 4896 rundll32.exe 88 PID 4896 wrote to memory of 3268 4896 rundll32.exe 88 PID 4896 wrote to memory of 3268 4896 rundll32.exe 88 PID 4896 wrote to memory of 396 4896 rundll32.exe 89 PID 4896 wrote to memory of 396 4896 rundll32.exe 89 PID 4896 wrote to memory of 396 4896 rundll32.exe 89 PID 4896 wrote to memory of 4392 4896 rundll32.exe 90 PID 4896 wrote to memory of 4392 4896 rundll32.exe 90 PID 4896 wrote to memory of 4392 4896 rundll32.exe 90 PID 4896 wrote to memory of 3888 4896 rundll32.exe 91 PID 4896 wrote to memory of 3888 4896 rundll32.exe 91 PID 4896 wrote to memory of 3888 4896 rundll32.exe 91 PID 4896 wrote to memory of 4348 4896 rundll32.exe 92 PID 4896 wrote to memory of 4348 4896 rundll32.exe 92 PID 4896 wrote to memory of 4348 4896 rundll32.exe 92 PID 4896 wrote to memory of 3864 4896 rundll32.exe 93 PID 4896 wrote to memory of 3864 4896 rundll32.exe 93 PID 4896 wrote to memory of 3864 4896 rundll32.exe 93 PID 4896 wrote to memory of 3712 4896 rundll32.exe 94 PID 4896 wrote to memory of 3712 4896 rundll32.exe 94 PID 4896 wrote to memory of 3712 4896 rundll32.exe 94 PID 4896 wrote to memory of 4492 4896 rundll32.exe 95 PID 4896 wrote to memory of 4492 4896 rundll32.exe 95 PID 4896 wrote to memory of 4492 4896 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a032ef3dfbd2fba9aa86854095801c84d641e6019efa8bf80244a32c5308e40d.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 03-a9-60-c0-b4-e53⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3268
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 a9-4a-09-72-e0-3f3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:396
-
-
C:\Windows\SysWOW64\arp.exearp -s 49.12.169.208 ff-e6-69-ac-48-9a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4392
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 0c-21-a0-0b-7f-f63⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3888
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 de-36-4d-76-84-713⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 04-4f-ee-76-28-ab3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3864
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 72-0e-de-68-77-ca3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3712
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 96-0a-04-68-99-5a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 7283⤵
- Program crash
PID:5100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4896 -ip 48961⤵PID:5104